Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    skuld.bat

  • Size

    26.0MB

  • Sample

    240629-f1krla1hmf

  • MD5

    b6043c62279ba9658cb83d9a25e5a23b

  • SHA1

    f707fc5bb01d16e151fe115dccc730819a81da88

  • SHA256

    edd80a73c65730613d5eda3a78a5a79d7acf9c93b054882ff0f57f0cddfae36c

  • SHA512

    273c82e5f1a80d810874fcea5e03527bf0fe39663a875444ae15194a535b5ba37340193074abcb7534a17d0a99e52b77029a7a659505f488ec8717db54db7d69

  • SSDEEP

    49152:Mh3gBzuxsw5ZfN2roFEHsPlg2pTVDOlNtcU62VVQ4OnlDmhJaER7dZ0bGm47Nb9T:Me

Malware Config

Extracted

Family

xworm

Version

5.0

C2

amount-socket.gl.at.ply.gg:29643

Mutex

CBOJbsqFCwukBOQm

Attributes
  • install_file

    USB.exe

aes.plain

Targets

    • Target

      skuld.bat

    • Size

      26.0MB

    • MD5

      b6043c62279ba9658cb83d9a25e5a23b

    • SHA1

      f707fc5bb01d16e151fe115dccc730819a81da88

    • SHA256

      edd80a73c65730613d5eda3a78a5a79d7acf9c93b054882ff0f57f0cddfae36c

    • SHA512

      273c82e5f1a80d810874fcea5e03527bf0fe39663a875444ae15194a535b5ba37340193074abcb7534a17d0a99e52b77029a7a659505f488ec8717db54db7d69

    • SSDEEP

      49152:Mh3gBzuxsw5ZfN2roFEHsPlg2pTVDOlNtcU62VVQ4OnlDmhJaER7dZ0bGm47Nb9T:Me

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks